We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Abstract. In this paper we present DOMMLite - an extensible domainspecific language (DSL) for static structure definition of databaseoriented applications. The model-driven enginee...
Igor Dejanovic, Gordana Milosavljevic, Branko Peri...
In this paper we propose a new technique for robust keyword spotting that uses bidirectional Long Short-Term Memory (BLSTM) recurrent neural nets to incorporate contextual informa...
SM has shown a better performance than HMM in connected word recognition system; however, no reports we have read show that SM has been applied in LVCSR as decoding acoustic model ...